Impact
A heap use‑after‑free occurs in the RDPSND async playback thread of FreeRDP. When the audio channel is closed, the library continues to process queued packets after its internal state has been freed, corrupting heap memory and allowing an attacker to overwrite memory or execute arbitrary code through the rdpsnd_treat_wave routine.
Affected Systems
FreeRDP installations running any version prior to 3.22.0 are affected. The vulnerability is present in all builds that include the RDPSND component and has been fixed in the 3.22.0 release.
Risk and Exploitability
The vulnerability scores 8.7 on the CVSS scale and has an EPSS score of less than 1 %. It is not present in the CISA KEV catalog. Attackers can exploit it remotely by connecting to a vulnerable FreeRDP client or server, sending crafted audio packets after the channel has been closed. Successful exploitation would give the attacker the ability to execute code with the privileges of the FreeRDP process.
OpenCVE Enrichment
Ubuntu USN